(Go: >> BACK << -|- >> HOME <<)

Subscribe to our e-mail newsletters
For more info on a specific newsletter, click the title. Details will be displayed in a new window.
Finance
Security
Computerworld Daily News (First Look and Wrap-Up)
Computerworld Blogs Newsletter
The Weekly Top 10
More E-Mail Newsletters 
 


Ads by TechWords

See your link here
 
Computerworld 2007Subscribe to Computerworld
40 years of the most authoritative source of news and information for IT leaders.
SSL Certificates
Entrust SSL certificates encrypt Web transactions, enhance user trust

Vivek Kundra reinstated as federal CIO
Vivek Kundra returned to his job as the federal government's CIO, five days after he took a leave of absence following the bribery-related arrest of a former subordinate in the District of Columbia's IT department. Read more...

Blogger who streamed pre-release Guns N' Roses songs deserves prison time, say Feds

D.C. IT bribery suspect to remain in jail; judge says evidence 'overwhelming'

Criminals sneak card-sniffing software on Diebold ATMs

Facebook puts privacy controls in hands of its users

Civil liberties groups oppose government mobile-phone tracking

Visa drops Heartland, RBS WorldPay from PCI compliance list after breaches

Waledac bot pitches nearby terrorist bombing to dupe users

Browser add-on locks out targeted advertising

Experts: Patent dispute with Intel won't choke supply of AMD chips

More Security StoriesMore Top Stories

Five Things You Can't See on Your Network
Networks today are blind. As analyst firms such as Gartner have pointed out, IT doesn't really know which users are on the network. Similarly, IT knows very little about the application traffic on the LAN.

No Infinite Beer
It's always worth remembering that what sounds too good to be true usually is.

Opinion: What it will take to wire the rest of the world
Winn Schwartau sees the need for the industry to rethink three areas if the 85% of the world that isn't wired is going to get online.

Layoffs Put Security on the Back Burner
Nearly half of the security staff is being laid off. How much of what an infosec department needs to do can still be done?

Securing Your Virtualized Environment
Virtualization's lure is increasing as IT departments in today's crashing economy are asked to do more with less. But resist the temptation to skimp on security.

Kundra takes leave, Google raises privacy flags
Well, at least the issue is not unpaid taxes this time -- but Vivek Kundra, the brand-new, first-ever federal CIO after just a few days on the job is already on a leave of absence after the office of the Washington, D.C., CTO was raided by federal agents. Kundra had been the District's CTO before President Barack Obama appointed him the nation's CIO. In other news, Google peeved privacy advocates by announcing a behavioral advertising program and separately saying it is testing a new service that will transcribe voice-mail messages and make them searchable.

The stateful LAN: Layer 7 visibility and control
Enterprises have seen an explosion of new applications, devices and classes of users on their LANs, which makes it harder than ever for IT to ensure network performance, secure corporate assets and comply with regulations. In response, next-generation intelligent LAN switches are emerging that are designed to provide stateful, deep-packet inspection up through Layer 7, providing granular user- and application-level controls.

What's behind move toward managed services
When the going gets tough, the tough get ... managed? Apparently so.

Effects of corporate social media on network security
In today's increasingly communicative world, businesses face a dilemma. They have to find ways to be more engaging and communicate more directly to their customers and the public, while retaining close control of sensitive information.

SOA Security: The Basics
In this article, we examine how security applies to Service Oriented Architecture (SOA). Before we discuss security for SOA, lets take a step back and examine what SOA is. SOA is an architectural approach which involves applications being exposed as "services". Originally, services in SOA were associated with a stack of technologies which included SOAP, WSDL, and UDDI. However, many grassroots developers then showed a preference for lightweight REST (Representational State Transfer) services as opposed to the more heavyweight SOAP messages, with the result that REST is now an accepted part of SOA. The rise of Web 2.0 has cemented RESTss place in the SOA world, since REST is widely used in Web 2.0. More recently, Cloud services such as Amazon's Simple Queuing Service (SQS) may be used alongside local services, to create a "hybrid" SOA environment. The result of all this is that SOA now encompasses the original SOAP/REST/UDDI stack, REST services, and the Cloud. From a security

Can't afford a new PC? These free tools for Windows will help breathe new life into your old machine.
Linux installation issues bedeviled Preston Gralla's first foray into the OS. Here, thanks to readers' advice, he solves his problems -- at least, most of them.
Everybody loves the iPhone, but follow Apple's strict rules or it's 'No soup for you!' says columnist Mike Elgan.
With workers getting laid off in droves, companies must figure out what to do with countless PCs and mobile devices -- not to mention sensitive corporate data.
Get the latest news, reviews and more about Microsoft's newest desktop operating system
Find wage data for 50 IT job titles.
Six Ways to Reduce Mobility Costs
Controlling costs is a top priority in today's challenging economic environment. This white paper highlights six ways that Fiberlink's services can save customers money on mobility, management and security.
More White Papers More White Papers
Sign up now for complimentary access to these upcoming Computerworld webcasts.
Featured Zone
Security and Compliance Zone

If you are faced with the complexity of meeting stringent privacy policies and continually changing government requirements, the new Novell® Compliance Management Platform will provide welcome relief. Only the Novell Compliance Management Platform integrates identity, access, and security information and event management technology to provide a real-time, holistic view of all network events across an enterprise. This tight integration eases implementation while creating the ultimate governance solution; ensuring business policy becomes automated IT practice.


Identity and Security Management and Strong Information Technology Governance: Novell's Solution Suite Automates the Approach to the Perfect Union

This IDC White Paper examines Novell's identity and security management (ISM) solutions and how these integrated offerings can play a key role in enforcing security compliance for enterprise organizations.

Success Story: New York City Transit

One of the top priorities of New York City Transit is to ensure that its employees have secure and timely access to information. With a Novell® solution, the agency has automated identity management for 85,000 users, giving 49,000 employees secure, single sign-on to applications and providing 36,000 retirees with online access to benefit information.

Balancing Security Against Productivity

What makes for great security? Is it about keeping the bad guys out or letting the good guys in? About detecting attacks or preventing them? Security is a balancing act of all three of these and requires a holistic, integrated approach. All three disciplines must interact automatically and seamlessly to ensure an effective level of service that enables good business.

View Entire Zone
E-mail Address:
(Required)
 Security
 Networking Security
 Virus and Vulnerability Roundup
 Security: Issues and Trends
 Infrastructure & Control
"Comcast now believes a phishing or malware scam is to blame for exposing hundreds of its customers' user names and..." Read more Read More Blogs

"Nothing beats the freedom of WiFi. Coffee shops, restaurants, rest stops, even public libraries offer WiFi to customers and patrons..." Read more Read More Blogs

"I really like Linux, but why is it so hard to find documentation on removing it and why is it..." Read more Read More Blogs

More Security Blogs More Security Blogs
See all Computerworld Blogs See all Computerworld Blogs
White Papers
Security and Trust: The Backbone of Doing Business over the Internet
Earning the trust of online customers is vital for the success of any company that requires sensitive data to be transferred over the internet. With VeriSign you can put technology in place to help your online business protect customer data and build consumer trust. Learn how with this white paper.
Download this white paper now! 
TODAY'S TOP BLOG
Seth Weintraub Don Tennant Steven J. Vaughan-Nichols Mike Elgan Richi Jennings Mark Everett Hall

Linux, Apple, Microsoft, SaaS, Web 2.0, Security, Mobile. If it's tech, it's in our blogs.

Premier 100
For more information or to register, please visit premier100.com.

Storage Networking World (SNW)
For more information or to register, please visit snwusa.com.

Mobile & Wireless World (MWW)
For more information or to register, please visit mwwusa.com.

Infrastructure Management World (IMW)
For more information or to register, please visit imworldusa.com.

Business Intelligence Perspectives
For more information or to register, please visit biperspectives.com.

IT Executive Summits
For more information or to register, please visit itexecutivesummit.com.
See all events see all events

Symantec Report on the Underground Economy
The Symantec Report on the Underground Economy examines activity on underground economy servers observed by Symantec between July 1st, 2007 and June 30th, 2008. It includes analysis and discussion of the goods and services advertised, advertisers participating in the economy, the servers and channels that host the trading, and a snapshot of piracy activity observed.
Download this white paper 
Tolly Report: Symantec Endpoint Protection 11.0.3
Symantec's Endpoint Protection 11.0 provides faster processing for common functions such as opening and saving Word and PowerPoint files. This ability can improve the productivity and quality of experience for users. Find out how Symantec outperforms the competition, download the report now.
Download this white paper 
3 Steps to Protect Confidential Data on Laptops
Learn how to avoid being part of the one-third of security breaches that occur due to laptop theft. This report outlines specific steps to help you secure confidential data and minimize the impact of data loss resulting from stolen or missing laptops.
Download this white paper 
The Endpoint Challenge
Take the Endpoint Challenge and discover how your endpoint security solution compares to the protection your business needs
Take the Challenge